Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Computing
Study Set
TCP/IP IPv6 and IPv4
Quiz 12: Securing Tcp/Ip Environments
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 21
Short Answer
Match each item with a statement below. a.threat b.remote logon service c.PING sweep d.computer forensics e.port scanner f.handler g.session hijacking h.security policy i.honeypot -the process of examining the "footprints" that an attacker leaves behind
Question 22
Short Answer
In a(n) ____________________ attack, a service is inundated with requests, or malformed service requests, which cause a server to hang or freeze, preventing it from responding to input.
Question 23
Multiple Choice
Which type of attacks are designed to interrupt or completely disrupt operations of a network device or network communications?
Question 24
Short Answer
Match each item with a statement below. a.threat b.remote logon service c.PING sweep d.computer forensics e.port scanner f.handler g.session hijacking h.security policy i.honeypot -a manager system in a DDoS attack
Question 25
Short Answer
Match each item with a statement below. a.threat b.remote logon service c.PING sweep d.computer forensics e.port scanner f.handler g.session hijacking h.security policy i.honeypot -any activity that represents a potential danger or attack on a system or network
Question 26
Short Answer
Match each item with a statement below. a.threat b.remote logon service c.PING sweep d.computer forensics e.port scanner f.handler g.session hijacking h.security policy i.honeypot -an ICMP Echo-based operation used to locate active devices on a network
Question 27
Multiple Choice
Which of the following best defines an attempt to snoop inside traffic moving across the Internet to look for unprotected account and password information, or to obtain other sensitive information while it's in transit?
Question 28
Short Answer
Match each item with a statement below. a.threat b.remote logon service c.PING sweep d.computer forensics e.port scanner f.handler g.session hijacking h.security policy i.honeypot -an IP attack technique whereby an impostor takes over an ongoing communications session between a client and server
Question 29
Short Answer
Match each item with a statement below. a.threat b.remote logon service c.PING sweep d.computer forensics e.port scanner f.handler g.session hijacking h.security policy i.honeypot -a special-purpose software tool that cycles through all possible TCP and UDP port addresses looking for open ports that then can be probed for access or exploited for vulnerabilities
Question 30
Short Answer
Match each item with a statement below. a.threat b.remote logon service c.PING sweep d.computer forensics e.port scanner f.handler g.session hijacking h.security policy i.honeypot -a computer system deliberately set up to attract, entice, and entrap would-be attackers, often by being made to appear part of a larger network
Question 31
Multiple Choice
Which of the following is unsolicited and unwanted software that takes up stealthy unauthorized and uninvited residence on a computer?
Question 32
Multiple Choice
In how many minutes can any knowledgeable systems professional with the right toolkit break into just about any system if allowed unsupervised and unrestricted access to the computer on which such a system resides?